Author of the publication

Research on Detection Method of Unhealthy Message in Social Network.

, , , and . ICAIS (1), volume 11632 of Lecture Notes in Computer Science, page 497-508. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Opportunistic Resource Scheduling for LTE-Unlicensed With Hybrid Communications Modes., , , and . IEEE Access, (2018)GPS + BDS Network Real-Time Differential Positioning Using a Position Domain Estimation Method., , , , , , , , and . Remote Sensing, 11 (12): 1480 (2019)Blossom: Content Distribution Using Inter-Datacenter Networks., , and . GLOBECOM, page 1-6. IEEE, (2016)Sparse Signal Reconstruction Algorithm Based On Residual Descent., , , and . IWSSIP, page 261-264. IEEE, (2019)Hydraulic conductance and vulnerability to cavitation in corn (Zea mays L.) hybrids of differing drought resistance, , and . Environmental and Experimental Botany, 66 (2): 341--346 (May 2009)A distributed ADMM approach for energy-efficient resource allocation in mobile edge computing., , , , , and . Turkish J. Electr. Eng. Comput. Sci., 26 (6): 3336-3345 (2018)The Improvement of Compressive Sampling and Matching Pursuit Algorithm Based on Pre-estimation., , , , and . Int. J. Wirel. Inf. Networks, 23 (2): 129-134 (2016)Influence of Sheds Damage on the AC Pollution Flashover Performance of Different Voltage Class Composite Insulators., , and . IEEE Access, (2020)Coexistence of Cognitive Small Cell and WiFi System: A Traffic Balancing Dual-Access Resource Allocation Scheme., , , and . Wirel. Commun. Mob. Comput., (2018)Security and Cost-Aware Computation Offloading via Deep Reinforcement Learning in Mobile Edge Computing., , , , , , and . Wirel. Commun. Mob. Comput., (2019)